System and method for providing secure identification solutions
DCFirst Claim
Patent Images
1. A method of verifying information, comprising:
- granting access to a memory based on a security key;
storing first identification information in the memory on a chip with a radio frequency antenna;
incorporating the chip onto a radio frequency identification mechanism;
reading first identification information from the memory on the chip with a radio frequency antenna with a radio frequency reader; and
comparing the first identification information with second identification information to determine if a match exists.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
89 Citations
13 Claims
-
1. A method of verifying information, comprising:
-
granting access to a memory based on a security key; storing first identification information in the memory on a chip with a radio frequency antenna; incorporating the chip onto a radio frequency identification mechanism; reading first identification information from the memory on the chip with a radio frequency antenna with a radio frequency reader; and comparing the first identification information with second identification information to determine if a match exists.
-
-
2. A method of verifying registration information of an item, comprising:
-
granting access to a memory based on a security key; storing first identification information in a memory on a chip with a radio frequency antenna; incorporating the chip onto the item; reading the first identification information from the memory on the item with a radio frequency reader; and comparing the first identification information with second identification information obtained from a user to determine if a match exists. - View Dependent Claims (3)
-
-
4. A method of verifying identification information of an individual, comprising:
-
granting access to a memory based on a security key; storing first identification information in a memory on a chip with a radio frequency antenna; incorporating the chip onto an identification mechanism; reading the first identification information from the memory on the identification mechanism with a radio frequency reader; and comparing the first identification information with second identification information obtained from the individual to determine if a match exists. - View Dependent Claims (5, 6)
-
-
7. A method of verifying identification information of an individual, comprising:
-
granting access to a memory based on a security key; storing first identification information in a memory on a chip with a radio frequency antenna; incorporating the chip onto a communications device; reading the first identification information from the memory on the communications device with a radio frequency reader; and comparing the first identification information with second identification information obtained from the individual to determine if a match exists. - View Dependent Claims (8)
-
-
9. A method of verifying border crossing control information, comprising:
-
granting access to a memory based on a security key; storing identification information in a memory on a chip with a radio frequency antenna; incorporating the chip onto a radio frequency decal attached to at least one item; incorporating the chip onto a radio frequency card tied to an individual connected to the at least one item; reading the identification information from the memory on the radio frequency decal and the radio frequency card with a radio frequency reader; and comparing the identification information from the radio frequency decal and the radio frequency card to determine if a match exists. - View Dependent Claims (10)
-
-
11. A method of verifying identification information of an individual at an airport, comprising:
-
granting access to a memory based on a security key; storing first identification information in a memory on a chip with a radio frequency antenna; incorporating the chip onto at least one airport identification mechanism; reading the first identification information from the memory on the at least one identification mechanism with a radio frequency reader; and comparing the first identification information with second identification information obtained from the individual to determine if a match exists. - View Dependent Claims (12)
-
-
13. A method of verifying a user is authorized to download a software application, comprising:
-
storing first identification information on a chip, wherein a radio frequency antenna is embedded on the chip; incorporating the chip into at least one identification device; reading the first identification information from the at least one identification device with a radio frequency reader; accepting second identification information from the user; comparing the first identification information to the second identification information obtained from the user to verify the identification of the user.
-
Specification